General
-
Target
2024-06-27_b99d259b1ebd78aa5ebff88fc9608cd7_icedid
-
Size
5.4MB
-
Sample
240627-rybaxsyanj
-
MD5
b99d259b1ebd78aa5ebff88fc9608cd7
-
SHA1
6418236e3d4f6ee38e56a1b8b6c681d7a7e17235
-
SHA256
8aa642413c74430d04863e1bde5e5bd7f2c76cbbc302c08bb270cf33adb0321a
-
SHA512
b954e7a1e8b1c1f44f472f351f933d76ff602d516771ed286405d3cabf2bffff0507066dcd13b108839118c5f242ef570a283aa43c42155a7226af428579cc25
-
SSDEEP
98304:Ows2ANnKXOaeOgmh3IMOzf6ijFUMeeDdhnY9MDI3Ig:cKXbeO7GVzfzjSkDTY98jg
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-27_b99d259b1ebd78aa5ebff88fc9608cd7_icedid.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
2024-06-27_b99d259b1ebd78aa5ebff88fc9608cd7_icedid
-
Size
5.4MB
-
MD5
b99d259b1ebd78aa5ebff88fc9608cd7
-
SHA1
6418236e3d4f6ee38e56a1b8b6c681d7a7e17235
-
SHA256
8aa642413c74430d04863e1bde5e5bd7f2c76cbbc302c08bb270cf33adb0321a
-
SHA512
b954e7a1e8b1c1f44f472f351f933d76ff602d516771ed286405d3cabf2bffff0507066dcd13b108839118c5f242ef570a283aa43c42155a7226af428579cc25
-
SSDEEP
98304:Ows2ANnKXOaeOgmh3IMOzf6ijFUMeeDdhnY9MDI3Ig:cKXbeO7GVzfzjSkDTY98jg
-
Gh0st RAT payload
-
UPX dump on OEP (original entry point)
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-